{"id":78362,"date":"2025-07-09T12:52:44","date_gmt":"2025-07-09T09:52:44","guid":{"rendered":"https:\/\/gulftech-news.com\/en\/?p=78362"},"modified":"2025-07-09T12:52:45","modified_gmt":"2025-07-09T09:52:45","slug":"outdated-cybersecurity-practices-endanger-industrial-operations","status":"publish","type":"post","link":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/","title":{"rendered":"Outdated Cybersecurity Practices Endanger Industrial Operations"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-1024x1024.jpg\" alt=\"\" class=\"wp-image-78360\" srcset=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-1024x1024.jpg?v=1752054228 1024w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-300x300.jpg?v=1752054228 300w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-150x150.jpg?v=1752054228 150w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-768x768.jpg?v=1752054228 768w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-1536x1536.jpg?v=1752054228 1536w, https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-2048x2048.jpg?v=1752054228 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Positive Technologies helps resolve zero-day vulnerability in Windows<\/figcaption><\/figure>\n\n\n\n<p><strong><a href=\"https:\/\/www.cpx.net\/\">CPX Holding<\/a><\/strong>, a leading provider of cutting-edge cyber and physical security solutions and services, today released a new whitepaper titled <em>\u201cSecuring Operational Technology with Trust and Collaboration.\u201d<\/em><\/p>\n\n\n\n<p>The paper provides a comprehensive overview of the unique cybersecurity challenges facing Operational Technology (OT) environments and outlines practical recommendations for organizations seeking to modernize securely.<\/p>\n\n\n\n<p>As critical infrastructure sectors such as energy grids, transportation, manufacturing and water treatment plants become increasingly connected through cloud, IoT and AI, the study highlights that implementing traditional IT security frameworks is not only inadequate but can be risky when applied to OT. <\/p>\n\n\n\n<p>From the Triton malware targeting safety systems to the 3CX supply chain compromise and the recent Norwegian Dam breach that revealed hidden vulnerabilities, these incidents underscore that OT cybersecurity must be approached differently.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n\n\n\n<p>There is an urgent need for organizations to embed a \u2018cybersecurity by design\u2019 approach early in the Engineering, Procurement and Construction lifecycle rather than bolting on controls after systems are deployed to promote safer, more resilient industrial operations.<\/p>\n\n\n\n<p>\u201cThese incidents are a wake-up call, and organizations must stop securing OT as if it were IT,\u201d said <strong>Azeem Aleem, Global Executive Director, Cyber Resilience Services at CPX. <\/strong>\u201cOperational environments have unique requirements. <\/p>\n\n\n\n<p>Securing them demands trust, context, and a shared understanding of what\u2019s at stake. The whitepaper offers a practical roadmap to help organizations modernize securely, protect critical infrastructure, and navigate the complex realities of cyber risk in the industrial age.\u201d<\/p>\n\n\n\n<p>The findings also point to a critical competency crisis. As threats grow more sophisticated and the stakes rise, there is a shortage of cross-disciplinary trusted advisors who combine deep industrial operations knowledge with cybersecurity acumen. <\/p>\n\n\n\n<p>The paper defines eight core competencies essential, including mastery of industrial control systems, secure digital transformation enablement and the humility to recognize that IT-centric solutions often fail in mission-critical environments.<\/p>\n\n\n\n<p>This publication calls on regulators, operators, technology vendors, and the security community to collaborate, rethink outdated approaches and build trust-driven strategies that match the realities of today\u2019s industrial threat landscape.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Positive Technologies helps resolve zero-day vulnerability in Windows CPX Holding, a leading provider of cutting-edge cyber and physical security solutions and services, today released a new whitepaper titled \u201cSecuring Operational Technology with Trust and Collaboration.\u201d The paper provides a comprehensive overview of the unique cybersecurity challenges facing Operational Technology (OT) environments and outlines practical recommendations &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3027,1034],"class_list":["post-78362","post","type-post","status-publish","format-standard","hentry","category-news","tag-cpx-holding","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Outdated Cybersecurity Practices Endanger Industrial Operations - Gulf Tech News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Outdated Cybersecurity Practices Endanger Industrial Operations - Gulf Tech News\" \/>\n<meta property=\"og:description\" content=\"Positive Technologies helps resolve zero-day vulnerability in Windows CPX Holding, a leading provider of cutting-edge cyber and physical security solutions and services, today released a new whitepaper titled \u201cSecuring Operational Technology with Trust and Collaboration.\u201d The paper provides a comprehensive overview of the unique cybersecurity challenges facing Operational Technology (OT) environments and outlines practical recommendations &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"Gulf Tech News\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-09T09:52:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-09T09:52:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-scaled.jpg?v=1752054228\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"bessan helmi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bessan helmi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/\",\"url\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/\",\"name\":\"Outdated Cybersecurity Practices Endanger Industrial Operations - Gulf Tech News\",\"isPartOf\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-1024x1024.jpg\",\"datePublished\":\"2025-07-09T09:52:44+00:00\",\"dateModified\":\"2025-07-09T09:52:45+00:00\",\"author\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\"},\"breadcrumb\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#primaryimage\",\"url\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-scaled.jpg?v=1752054228\",\"contentUrl\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-scaled.jpg?v=1752054228\",\"width\":2560,\"height\":2560,\"caption\":\"Positive Technologies helps resolve zero-day vulnerability in Windows\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gulftech-news.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Outdated Cybersecurity Practices Endanger Industrial Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\",\"url\":\"https:\/\/gulftech-news.com\/en\/\",\"name\":\"Gulf Tech News\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gulftech-news.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\",\"name\":\"bessan helmi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"caption\":\"bessan helmi\"},\"url\":\"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Outdated Cybersecurity Practices Endanger Industrial Operations - Gulf Tech News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/","og_locale":"en_US","og_type":"article","og_title":"Outdated Cybersecurity Practices Endanger Industrial Operations - Gulf Tech News","og_description":"Positive Technologies helps resolve zero-day vulnerability in Windows CPX Holding, a leading provider of cutting-edge cyber and physical security solutions and services, today released a new whitepaper titled \u201cSecuring Operational Technology with Trust and Collaboration.\u201d The paper provides a comprehensive overview of the unique cybersecurity challenges facing Operational Technology (OT) environments and outlines practical recommendations &hellip;","og_url":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/","og_site_name":"Gulf Tech News","article_published_time":"2025-07-09T09:52:44+00:00","article_modified_time":"2025-07-09T09:52:45+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-scaled.jpg?v=1752054228","type":"image\/jpeg"}],"author":"bessan helmi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bessan helmi","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/","url":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/","name":"Outdated Cybersecurity Practices Endanger Industrial Operations - Gulf Tech News","isPartOf":{"@id":"https:\/\/gulftech-news.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#primaryimage"},"image":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-1024x1024.jpg","datePublished":"2025-07-09T09:52:44+00:00","dateModified":"2025-07-09T09:52:45+00:00","author":{"@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c"},"breadcrumb":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#primaryimage","url":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-scaled.jpg?v=1752054228","contentUrl":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/PT_Windows-11_1500x1500-1-scaled.jpg?v=1752054228","width":2560,"height":2560,"caption":"Positive Technologies helps resolve zero-day vulnerability in Windows"},{"@type":"BreadcrumbList","@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/09\/outdated-cybersecurity-practices-endanger-industrial-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gulftech-news.com\/en\/"},{"@type":"ListItem","position":2,"name":"Outdated Cybersecurity Practices Endanger Industrial Operations"}]},{"@type":"WebSite","@id":"https:\/\/gulftech-news.com\/en\/#website","url":"https:\/\/gulftech-news.com\/en\/","name":"Gulf Tech News","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gulftech-news.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c","name":"bessan helmi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","caption":"bessan helmi"},"url":"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/"}]}},"_links":{"self":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/78362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/comments?post=78362"}],"version-history":[{"count":1,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/78362\/revisions"}],"predecessor-version":[{"id":78363,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/78362\/revisions\/78363"}],"wp:attachment":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/media?parent=78362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/categories?post=78362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/tags?post=78362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}